Scalability: How Unikernels can Improve the Status Quo. In 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016). Shanghai, China, pp. 1–6. Robison, W.J., 2010. Free at What Cost?: Cloud Computing Privacy Under the Stored Communications Act. Georgetown Law Journal, 98(4), pp.1195–1239. Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1596975. Larson, D. & Chang, V., 2016. A Review and Future Direction of Agile, Business Intelligence, Analytics and Data Science. International Journal of Information Management, pp.1–25. Holland, R. et al., 2015. Quick Take: 12 Lessons For Security & Risk Pros From The US OPM Breach. Forrester Research Inc, (Jun 8, 2015), pp.1–10. Available at: https://www.forrester.com/Quick+Take+12+Lessons+For+Security+Risk+Pros+From+The+US+ OPM+Breach/fulltext/-/E-res123441. Soghoian, C., 2010. Caught in the cloud: Privacy, encryption, and government back doors in the web 2.0 era. J. on Telecomm. & High Tech. L., 8(2), pp.359–424. Available at: http://jthtl.org/content/articles/V8I2/JTHTLv8i2_Soghoian.PDF %5Cnhttp://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi? handle=hein.journals/jtelhtel8§ion=18. Da Xu, L., He, W. & Li, S., 2014. Internet of Things in Industries: A Survey. IEEE Transactions on Industrial Informatics, 10(4), pp.2233–2243. Macklin, B.W., 1999. E-Commerce at What Price? Privacy Protection in the Information Economy. SSRN Electronic Journal, (9552699), pp.1–51. Available at: http://www.ssrn.com/abstract=180290. Singh, J. & Bacon, J.M., 2014. On middleware for emerging health services. Journal of Internet Services and Applications, 5(1), p.6. Available at: http://www.jisajournal.com/content/5/1/6. Guttman, B. & Roback, E.A., 2011. NIST Special Publication 800-12. An Introduction to Computer Security: The NIST Handbook, Available at: csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf. Cisco2014, 2014. Cisco 2014 annual security report, Available at: http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf. Kesan, J.P. & Gallo, A.A., 2003. Optimizing Regulation of Electronic Commerce. Illinois Law and Economics Working Papers Series, (LE02-001), pp.1–129. Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=289668. Soghoian, C., 2011. The Law Enforcement Surveillance Reporting Gap. Social Science Research Network, pp.1–26. Available at: http://ssrn.com/abstract=1806628. Ohaya, C., 2006. Managing Phishing Threats in an Organization. InfoSecCD ’06: Proceedings of the 3rd annual conference on Information security curriculum development, pp.159–161. Available at: http://portal.acm.org/citation.cfm? doid=1231047.1231083. Millard, C., Walden, I. & Hon, W.K., 2012. Who is Responsible for “Personal Data” in Cloud Computing? The Cloud of Unknowing, Part 2. Legal Studies, 27(77), pp.1–31. Available at: http://ssrn.com/abstract=1794130. Cisco, 2013. 2013 Cisco Annual Security Report, Kavanagh, C. & Carrieri, M., 2012. Cyber Dialogue 2012 Briefs: Limits of Dissent in Cyberspace. In Cyberdialogue2012. pp. 1–9. Howard, M. & Lipner, S., 2010. Security Ddevelopment Lifecycle. Datenschutz und Datensicherheit - DuD, 34(3), pp.135–137. Available at: http://link.springer.com/10.1007/s11623-010-0021-7. NIST, 2014. NIST Cloud Computing Forensic Science Challenges. , p.51. Ali, M., Khan, S.U. & Vasilakos, A. V., 2015. Security in cloud computing: Opportunities and challenges. Information Sciences, 305, pp.357–383. Available at: http://dx.doi.org/10.1016/j.ins.2015.01.025. Wei, L. et al., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371–386. Available at: http://dx.doi.org/10.1016/j.ins.2013.04.028. Kavanagh, C. & Carrieri, M., 2012. Cyber Dialogue 2012 Briefs: Whither “Rules of the Road” for Cyberspace? In Cyberdialogue2012. pp. 1–18. Srinivasamurthy, S., Wayne, F. & Liu, D.Q., 2013. Security and Privacy in Cloud Computing : A Survey Security and Privacy in Cloud Computing : In 2010 Sixth International Conference on Semantics, Knowledge and Grids. pp. 126–149. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5663489. Bojanova, I., Hurlburt, G. & Voas, J., 2013. Today, the Internet of Things. Tomorrow, the Internet of Everything. Beyond that, perhaps, the Internet of Anything - a Radically Super-Connected Ecosystem Where Questions About Security, Trust, and Control Assume Entirely New Dimensions. information-development, p.4. Data Protection Working Party, 2012. Opinion 05/2012 on Cloud Computing, Brussels. Available at: http://ec.europa.eu/justice/data-protection/article- 29/documentation/opinion-recommendation/files/2012/wp196_en.pdf. Wenge, O. et al., 2012. Much Ado about Security Appeal: Cloud Provider Collaborations and Their Risks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7592 LNCS(1), pp.80–90. Available at: http://link.springer.com/content/pdf/10.1007/978-3-642-33427-6_6.pdf. Lee, J. & Clifton, C., 2012. Differential Identifiability. Kdd, pp.1041–1049. Susanto, H., Almunawar, M.N. & Tuan, Y.C., 2012. Information Security Challenge and Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level. International Journal of Engineering and Technology, 2(1), pp.67–75. Available at: http://scholar.googleusercontent.com/scholar? q=cache:2Ms1Xc36i7gJ:scholar.google.com/ +ITIL+information+security+challenges&hl=en&as_sdt=0,5. Babar, M.A. & Chauhan, M.A., 2011. A Tale of Migration to Cloud Computing for Sharing Experiences and Observations. Proceeding of the 2nd international workshop on Software engineering for cloud computing - SECLOUD ’11, p.50. Available at: http://portal.acm.org/citation.cfm?doid=1985500.1985509. Duncan, B., Duncan, B. & Whittington, M., 2016. Enhancing Cloud Security and Privacy : The Power and the Weakness of the Audit Trail Enhancing Cloud Security and Privacy : The Power and the Weakness of the Audit Trail. In Cloud Computing 2016: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization. Rome: IEEE, pp. 125–130. Pasquier, T.F.J. et al., 2013. Information Flow Audit for PaaS Clouds. Bugnion, E. et al., 2012. Bringing Virtualization to the x86 Architecture with the Original VMware Workstation. ACM Transactions on Computer Systems ACM Reference Format: Bugnion, ACM Trans. Comput. Syst, 30(12), p.51. Yang, J. & Chen, Z., 2010. Cloud Computing Research and Security Issues. Computing, pp.10–12. Available at: http://www.scopus.com/inward/record.url?eid=2-s2.0- 79951629965&partnerID=40&md5=26612afab22ab45b61795892582f5ef8. Bacon, J. et al., 2014. Information Flow Control for Secure Cloud Computing. IEEE Transactions on Network and Service Management, 11(1), pp.76–89. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6701293. Wang, C. et al., 2010. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In IEEE INFOCOM 2010. pp. 362–375. Berman, F., 2010. We Need a Research Data Census. Communications of the ACM, 53(12), pp.39–41. Available at: http://portal.acm.org/citation.cfm? doid=1859204.1859220 [Accessed October 24, 2011]. Moore, T., Clayton, R. & Anderson, R., 2009. The Economics of Online Crime. Journal of Economic Perspectives, 23(3), pp.3–20. Available at: http://pubs.aeaweb.org/doi/abs/10.1257/jep.23.3.3. Sharma, S. et al., 2016. Cloud-based Emerging Services Systems. International Journal of Information Management, pp.1–19. Available at: http://linkinghub.elsevier.com/retrieve/pii/S0268401216301608. Duncan, B. & Whittington, M., 2014. Compliance with Standards, Assurance and Audit: Does this Equal Security? In Proceedings of the 7th International Conference on Security of Information and Networks. Glasgow: ACM, pp. 77–84. Trend, 2011. A Look Back at 2011, Haimes, Y.Y. et al., 2015. Assessing systemic risk to cloud-computing technology as complex interconnected systems of systems. Systems Engineering, 18(3), pp.284–299. Ion, I. et al., 2011. Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage. In Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS ’11. p. 1. Available at: http://dl.acm.org/citation.cfm? id=2078827.2078845. Pearson, S. & Charlesworth, A., 2009. Accountability as a way forward for privacy protection in the cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5931 LNCS(December), pp.131–144. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.406.4389. Ruebsamen, T. & Reich, C., 2013. Supporting Cloud Accountability by Collecting Evidence Using Audit Agents. In Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom. pp. 185–190. Pearson, S. & Benameur, A., 2010. Privacy, Security and Trust Issues Arising from Cloud Computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science. Ieee, pp. 693–702. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5708519 [Accessed May 28, 2013]. Pearson, S., 2009. Taking account of privacy when designing cloud computing services. Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009, pp.44–52. Available at: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5071532. Xu, G. et al., 2015. A cloud computing based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems, 30(1), pp.29– 45. Available at: http://dx.doi.org/10.1080/17445760.2014.925110. Dlamini, M., Eloff, J. & Eloff, M., 2009. Information security: The moving target. Computers & Security, 28(3–4), pp.189–198. Available at: http://www.sciencedirect.com/science/article/pii/S0167404808001168 [Accessed August 2, 2013]. Zeller, M. et al., 2009. Open Standards and Cloud Computing KDD-2009 Panel Report. Exchange Organizational Behavior Teaching Journal, pp.11–18. Alhamad, M. et al., 2010. Response Time for Cloud Computing Providers. Response, pp.8–10. Available at: http://dl.acm.org/citation.cfm?id=1967579. Doelitzscher, F. et al., 2012. Validating Cloud Infrastructure Changes By Cloud Audits. In Proceedings - 2012 IEEE 8th World Congress on Services, SERVICES 2012. pp. 377–384. Ralston, P.A.S., Graham, J.H. & Hieb, J.L., 2007. Cyber security risk assessment for SCADA and DCS networks. ISA Transactions, 46(4), pp.583–594. Available at: http://linkinghub.elsevier.com/retrieve/pii/S0019057807000754 [Accessed June 10, 2013]. Swire, P.P., 1999. Financial Privacy and the Theory of High-Tech Government Surveillance. Washington University Law Review, 77(2), pp.461–512. Available at: http://www.ssrn.com/abstract=133340. Chang, V., Kuo, Y.-H. & Ramachandran, M., 2015. Cloud Computing Adoption Framework: A security framework for business clouds. Future Generation Computer Systems, 57, pp.24–41. Available at: http://www.sciencedirect.com/science/article/pii/S0167739X15003118. Chang, V. & Ramachandran, M., 2016. Towards Achieving Data Security with the Cloud Computing Adoption Framework. , 9(1), pp.138–151. Pasquier, T., Shand, B. & Bacon, J., 2013. Information Flow Control for a Medical Records Web Portal. Cl.Cam.Ac.Uk, pp.1–8. Available at: http://www.cl.cam.ac.uk/research/srg/opera/publications/papers/2013TPasqPortal.pdf. Chang, V. & Ramachandran, M., 2015. Towards achieving Data Security with the Cloud Computing Adoption Framework. IEEE Transactions on Services Computing, 1374(c), pp.1–1. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm? arnumber=7299312. Tene, O., 2011. Privacy: The New Generations. International Data Privacy Law, 1(1), pp.15–27. Available at: http://ssrn.com/abstract=1710688. Pearson, S., 2013. Privacy and Security for Cloud Computing. In Privacy and Security for Cloud Computing. e: Springer, pp. 3–42. Available at: http://link.springer.com/10.1007/978-1-4471-4189-1. PWC, 2014. Managing cyber risks in an interconnected world Key findings from The Global State of Information Security® Survey 2015, Available at: www.pwc.com/gsiss2015. Hayes, B., 2008. Cloud computing. Communications of the ACM, 51(7), p.9. Available at: http://portal.acm.org/citation.cfm?doid=1364782.1364786 [Accessed July 9, 2011]. Susanto, H., Almunawar, M.N. & Tuan, Y.C., 2011. Information Security Management System Standards: A Comparative Study of the Big Five. International Journal of Electrical Computer Sciences IJECSIJENS, 11/5(October), pp.23–29. Available at: http://www.ijens.org/vol_11_i_05/113505-6969-ijecs-ijens.pdf. Neumann, P. & Contributors, 1988. Risks to the public. ACM SIGSOFT Software Engineering Notes, 13(4), pp.3–20. Available at: http://dl.acm.org/citation.cfm? id=2674632.2674635 [Accessed August 17, 2011]. Gantz, J.F. et al., 2007. The Expanding Digital Universe: A Forecast of Worldwide Information Growth Through 2010. External Publication of IDC (Analyse the Future) Information and Data, pp.1–21. Happe, A., Duncan, B. & Bratterud, A., 2016. Unikernels for Cloud Architectures: How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud Security. In Accepted by Complexis 2017. pp. 1–8. Xiao, Z. & Xiao, Y., 2013. Security and Privacy in Cloud Computing. Communications Surveys Tutorials, IEEE, 15(2), pp.843–859. Lorünser, T., Andreas Happe & Slamanig, D., 2015. ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing. IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, November 30 - December 3, pp.371–378. Smith, H.J., 2002. Ethics and Information Systems: Resolving the Quandaries. ACM SIGMIS Database, 33(3), pp.8–22. Available at: http://dl.acm.org/ft_gateway.cfm? id=569908&type=pdf&CFID=55565498&CFTOKEN=25090791. Pasquier, T.F.J. et al., 2015. Managing Big Data with Information Flow Control. In Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th International Conference. pp. 1–8. Heiser, G. et al., 2010. The Road to Trustworthy Systems. Legacy, pp.3–9. Available at: http://doi.acm.org/10.1145/1867635.1867638%5Cnhttp://www.cse.unsw.edu.au/~leonidr/. Gal-Or, E. & Ghose, A., 2004. The Economic Consequences of Sharing Security Information. Economics of information security, pp.95--104. Available at: http://pages.stern.nyu.edu/~aghose/Infosec_Book.pdf. Duncan, B. & Whittington, M., 2016. Cyber Security for Cloud and the Internet of Things: How Can it be Achieved ? Submitted to IET, pp.1–20.